This thesis deals with reverse engineering of Android and Java. It contains a description of existing tools and techniques, including techniques of defense. The first part is focused on available research about the topic. The next part discusses usage of reverse engineering in software development. The next chapters describe Android operating system and concept of a virtual machine on both platforms. Both kinds of architectures are compared (register-based vs stack-based machine). Core of the work is focused on static analysis (content of APK file, disassembling, decompilation). Available decompilers of class and dex files are compared. Testing is made with various versions of Java. The final chapter contains techniques and tools of defense...
Includes bibliographical references (p. 41-42).This thesis is focused on a detailed study of smart p...
Along with new artifact development, software engineering also includes other tasks. One of these ta...
The popularity of mobile devices leads to potential threats from hackers and intrusive techniques. A...
Práce se zabývá reverzním inženýrstvím na platformě Android a Java. Jsou analyzovány (popsány) exist...
Java is a platform-independent language. Java programs can be executed on any machine, irrespectiv...
Java is a platform independent language. Java programs can be executed on any machine, irrespecti...
Eksponencijalni rast i razvoj tehnologije te informatizacija i digitalizacija društva pridonijeli su...
Tidak semua perangkat lunak (aplikasi) menyediakan langsung sumber kodenya kepada para pengguna. Apl...
In Android, performing a program analysis directly on an executable source is usually inconvenient. ...
Android operating system is an open-source project developed by Google. It is based on the Linux ker...
As the most popular mobile operating system, Android has received considerable attention from the se...
This research paper is focused on the issue of mobile application malware detection by Reverse Engin...
In dieser Arbeit soll die praktische Eignung des Reverse Engineering von Software untersucht werden....
This bachelor's dissertation is about an application for Android. It's described from both a theoret...
In my bachelor thesis called Android operating system, I describe tools, options and special charact...
Includes bibliographical references (p. 41-42).This thesis is focused on a detailed study of smart p...
Along with new artifact development, software engineering also includes other tasks. One of these ta...
The popularity of mobile devices leads to potential threats from hackers and intrusive techniques. A...
Práce se zabývá reverzním inženýrstvím na platformě Android a Java. Jsou analyzovány (popsány) exist...
Java is a platform-independent language. Java programs can be executed on any machine, irrespectiv...
Java is a platform independent language. Java programs can be executed on any machine, irrespecti...
Eksponencijalni rast i razvoj tehnologije te informatizacija i digitalizacija društva pridonijeli su...
Tidak semua perangkat lunak (aplikasi) menyediakan langsung sumber kodenya kepada para pengguna. Apl...
In Android, performing a program analysis directly on an executable source is usually inconvenient. ...
Android operating system is an open-source project developed by Google. It is based on the Linux ker...
As the most popular mobile operating system, Android has received considerable attention from the se...
This research paper is focused on the issue of mobile application malware detection by Reverse Engin...
In dieser Arbeit soll die praktische Eignung des Reverse Engineering von Software untersucht werden....
This bachelor's dissertation is about an application for Android. It's described from both a theoret...
In my bachelor thesis called Android operating system, I describe tools, options and special charact...
Includes bibliographical references (p. 41-42).This thesis is focused on a detailed study of smart p...
Along with new artifact development, software engineering also includes other tasks. One of these ta...
The popularity of mobile devices leads to potential threats from hackers and intrusive techniques. A...